Overview
In March 2023, a major Microsoft customer experienced a series of spam cyberattacks causing outages in the customer’s system.
The cause? A barrage of fraudulently created Microsoft Outlook and Hotmail accounts seeking to reap the benefits of the customer’s services provided as test trials to prospective users, even though these fake accounts had no intention of ever paying for those services. As a result, the customer blocked all new account signups from Microsoft Outlook and Hotmail addresses.
What was in fact behind this attack was a bigger fraudulent enterprise based in Vietnam—a group Microsoft calls Storm-1152.
Storm-1152 ran illicit websites and social media pages, selling fraudulent Microsoft accounts and tools to bypass identity verification software across well-known technology platforms. Storm-1152’s services act as a gateway to cybercrime by reducing the time and effort needed for criminals to conduct a host of criminal and abusive behaviors online. In total, the group created for sale approximately 750 million fraudulent Microsoft accounts, earning the group millions of dollars in illicit revenue, and costing companies even more to combat their criminal activity.
Multiple groups, it turns out, were using Storm-1152 accounts to engage in ransomware, data theft and extortion, including Octo Tempest, Storm-0252, Storm-0455, and others. Its account sales business made it one of the largest cybercrime-as-a-service providers online.
Microsoft had been tracking the rise of this malicious activity since 2022, increasing the use of machine learning algorithms to prevent and detect observed patterns for the creation of these fraudulent accounts. However, spring 2023 marked an inflection point due to the escalating abuse of Microsoft and partner platforms. More aggressive action was required and a cross functional team across Microsoft and with our partner Arkose Labs was formed.
The coordinated effort resulted in Microsoft’ Digital Crimes Unit (DCU) taking the first legal action in December 2023 to seize and shut down the websites Storm-1152 was using to sell its services. Immediately following the action, we observed an approximate 60% decrease in sign-up traffic. This decrease closely matches the 60% or more of sign-ups that our algorithms or partners later identified as abusive and that we subsequently suspended from Microsoft services. On July 23, we filed a second civil action to disrupt new infrastructure the group had attempted to set up following our December lawsuit.
This emerging threat report goes behind the scenes on how the action went down and highlights the importance of collaborating across industry to go after cyber threats. The case is an example of how industry can use legal channels to help deter other groups and keep individuals safe online. It also speaks to the importance of ongoing disruptions and how legal actions remain an effective method against cybercriminals, even when they change their tactics. At the end of the day, no operation is a one-and-done.
Follow Microsoft Security